There is nothing particular to do, however you should definitely avoid:
- storing password in clear
- using a simple hash such as MD5 without some salt (i.e. some quantity of variability introduced while hashing)
One way to do that is to store the date of the last password change (such as with an integer on 64 bits) in the account together with the hash (something like SHA1 should be reasonable). When the user connects, the form is given the number (called a 'salt'), the form packs the salt with the typed password (in a predefined encoding such as UTF8), and produce a hash on that, and transmits that on the wire as base64 for example (I mean your password field could be just a text field containing that base64 encoded hash). If the communication to the server (database or application) is secured, the password can transit on the wire no problem. The server compares the two hashes and if they match it's OK.
The reason for the salt is to hugely slows down attack based on pre-built dictionaries of MD5 or SHA hashes being matched against your database of passwords (if it happens to be downloaded by hackers). It also helps if the connection can be read by a hacker, as the same pre-built dictionary attack could work on MD5 hashes passing on the wire.